Complete the sentence.
A(n)
A. Accessibility document
B. User manual
C. Code library
D. Version control document keeps track of the version numbers of an app and what changes were made váth each
version

Answers

Answer 1

Answer: D Version control document

Explanation: right on cs

Answer 2

A version control document keeps track of the version numbers of an application and what changes were made in each version.

What is version control?

Version control can be defined as a process through which changes to a document, file, application and software codes over time, are tracked, recorded and managed, especially for easy recall and modification of specific versions in the future.

In Computer technology, an example of a version control system that is commonly used by software developers across the world is Git.

Read more on version control here: https://brainly.com/question/22938019

#SPJ2


Related Questions

you can use view the ______ file to view the hard drive details.

Answers

Answer:

/proc/partitions

Language learning programs like Rosetta Stone would not be considered a simulation game because you aren’t really practicing verbal skills, you are just memorizing words.

A.
True

B.
Fale

Answers

Answer:

True

Explanation:

which data type consumes the least storage space?
text
OLE object
yes/no
memo​

Answers

Answer:

yes/no

Explanation:

Since yes /no has a storage of only 1 bit. Text max. 250 characters, memo 65,535 characters, OLE object 4G.B.

Growing up with dyslexia, Stephanie always struggled in English and Reading. Math was a breeze for her, though. Along the way, there were a few teachers who really worked closely with Stephanie to help her absorb the information she needed, and they showed her how to make learning fun! Stephanie particularly loved studying trigonometry and even her high school teacher is having difficulty keeping up with her. Now that she has been able to figure out how to study, education no longer scares Stephanie. In fact, she finds it a great way to explore and understand the world around her

Answers

Explanation:

A lot of people with dyslexia can relate to Stephanie.

Draw a logic gate circuit for each of the following Boolean expressions.
1- F= AB’
2-F = A’ + (B*C)
3-F= (A*B) + (A*C)

Answers

Answer:

can you explain more please I didn't understand

how do spear phishing attacks differ from standard phishing attacks?

Answers

Answer:

Phishing attacks normally target random people on mass amount by sending emails to users. In the other hand the spear phishing only targets 1 person hence the name "spear".

Hope this help please give the brainliest award.

Easy Question I will make you brainless Just answer this 10 question!!​

Answers

Answer:

B

Sc

B

Sc

B

B

Sc

B

Sc

Sc

Explanation:

Not positive sorry if its not 100% correct

What refers to the place you drag and drop blocks to create instructions in Scratch?

A.
playground

B.
sprite

C.
editor

D.
environment

Answers

Answer:

It is called the editor script area, hence the name is where you create and edit code.

Hope this help please give the brainliest award.

what is the url of the website that would allow you to change your password, adjust quotas, and check a list of known computer problems on campus?

Answers

Answer:

Go to your schools website and look for the change password, ETC area I would guess it would be a "Help" tab

Explanation:

You did not explain what Campus your on however you can find this yourself pretty easy.

Preset headers and footers cannot have additional information add to the areas.
Group of answer choices

True

False

Answers

the answer to the question is true

in 2014, what percentage of the world population has access to the internet?

Answers

Answer:

At that time 43.9% of people have access to the global internet.

PLS HELP ASAP ILL GIVE THANKS AND BRAINLIEST IF YOU GET THEM ALL RIGHT:

1. Software used to search a database using keywords or phrases entered by the user.
A) Navigation Tracking
B) Network
C) Search Engine
D) Ethernet Cable

2. This is used to mark a web pages structure using tags so that the web browser displays the content correctly.

A) Antivirus application
B) Ethernet cable
C) Computer virus
D) HTML

3. this is used to connect devices like printers, keyboards, external storage, and digital cameras to computers.

A) Modem
B) USB
C) Intranet
D) Desktop Interface

4. software that the owner maintains exclusive control over how it is modified and distributed

A) proprietary
B) navigation tracking
C) Spyware
D) operating system

5. set of principles that help users determine what is right or wrong in regards to computers.

A) modem
B) HTML
C) navigation tracking
D) Computer ethics

6. spyware that manages all of the installed applications and hardware on a computer or device.

A) Computer virus
B) operating system
C) citation
D) HTML

7. physical components of a computer system such as computer, mouse, or modem.

A) software
B) Network
C) browser
D) hardware

8. A malicious software program that spies on the user and share the information with a third-party.

A) antivirus application
B) malware
C) spyware
D) Desktop interface

9. icons and menus on the computer that allow the user to interact with the operating system.

A) Desktop interface
B) intranet
C) navigation tracking
D) Computer ethics

10. A tool that provides directions using satellites

A) asynchronous communication
B) navigation tracking
C) Ethernet cable
D) HTML

11. A restricted private network used by organizations to communicate.

A) asynchronous communication
B) navigation tracking
C) intranet
D) browser

12. content that is not owned by any individual or company that is free to use.

A) network
B) proprietary
C) Desktop interface
D) public domain

13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer

A) Cable Internet
B) Computer virus
C) public domain
D) operating system

12. content that is not owned by any individual or company that is free to use.

A) network
B) proprietary
C) Desktop interface
D) public domain

13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer

A) Cable Internet
B) Computer virus
C) public domain
D) operating system

Answers

This is a lot, but here goes!

1. C

2. D

3. B

4. A

5. D

6. B

7. D (these are technically peripherals or input devices.)

8. C

9. A

10. B

11. A

12. D

13. B

Just as a note, spyware is malware.

ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!


1. A means of giving credit to a source when their information is used.

A) Citation
B) Wi-Fi
C) Asynchronous Communication
D) Malware

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
A) Spyware
B) Phishing
C) Malware
D) Wi-Fi

3. A device that translates analog carrier signals to encode and decode digital information.

A) USB
B) Computer Virus
C) Intranet
D) Modem

4. A virus or Trojan horse designed to cause harm to computer or device.

A) Hardware
B) Malware
C) Modem
D) Antivirus Application

5. Software that is used to detect and eliminate computer viruses.

A) Wi-Fi
B) Cable Internet
C) Antivirus Application
D) Browser

6. Transmits data through a cable television network as a means to connect a computer to the internet.

A) Desktop Interface
B) Cable Internet
C) Operating System
D) USB

7. An application used to access websites on the internet.

A) Malware
B) Internet
C) Proprietary
D) Browser

8. Communication that does not happen in real time.

A) Asynchronous Communication
B) Wi-Fi
C) Ethernet Cable
D) Malware

9. A network of computers that provides access to information on the web.

A) Phishing
B) Internet
C) Antivirus Application
D) Modem

10. The cable used to connect computers in a network.

A) Computer Virus
B) Ethernet Cable
C) Intranet
D) Hardware

Answers

Easy Peasy Lemon Squeezy

1. A means of giving credit to a source when their information is used.

A.) Citation

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.

B.) Phishing

3. A device that translates analog carrier signals to encode and decode digital information.

D.) Modem

4. A virus or Trojan horse designed to cause harm to computer or device

B.) Malware

5. Software that is used to detect and eliminate computer viruses.

C.) Antivirus Application

6. Transmits data through a cable television network as a means to connect a computer to the internet.

B.) Cable Internet

7. An application used to access websites on the internet.

D.) Browser

8. Communication that does not happen in real time.

A.) Asynchronous Communication

9. A network of computers that provides access to information on the web.

B.) Internet

10. The cable used to connect computers in a network.

B) Ethernet Cable

Answer:

your mom

Explanation:

What language do programmers use to communicate with a computer?

Input code
Linguistic code
Programming code
Virtual code

Answers

Answer:

I would say programming code

Explanation:

Since its a system of rules written in a particular programming language

The language that programmers use to communicate with a computer is called "Programming code".

The correct option is C.

Programming code is the language that is used by developers to create software programs, applications, and websites. These languages are based on a set of instructions that tell the computer what to do.

Programming languages can be divided into two categories: low-level and high-level.

Low-level languages are closer to the binary code that computers use to execute instructions.

High-level languages are more abstract and easier for humans to understand and use.

Examples of high-level languages include Python, Java, JavaScript, and C++.

Programmers use programming languages to create algorithms and procedures that the computer can follow to complete tasks. This involves writing code that is syntactically correct and logically sound. Once the code is written, it must be compiled or interpreted by the computer so that it can be executed.

Know more about programming language,

https://brainly.com/question/23959041

#SPJ3

____ describes the period of time in a twenty-four-hour period that is spent at work.

Answers

I believe "Work-Shift" should be in the blank

computer ________ involves identifying, extracting, preserving, and documenting computer evidence.

Answers

computer forensics is the answer

Language modeling incorporates rules of __. Select all that apply.

A. story structure

B. grammar

C. dictionary definitions

D. pronunciation patterns

Answers

Language modeling incorporates rules of grammar and pronunciation patterns

Language modeling  is simply known to use rules of grammar, known pronunciations, and other patternsIt seeks to know the given probability distribution of all linguistic units such as words, sentences.  is main work is to predict the next word that is to come in a document.It makes use of grammar principles and the various forms of pronunciation in its task.

Conclusively, we can say that Language modeling incorporates rules of grammar and pronunciation patterns

Learn more from

https://brainly.com/question/6214562

what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage

Answers

Answer:

could have used a browser  but ok

Explanation:

The arrangement of various flash elements such as the tools panel control panel property inspector and windows is called the Workspace. Explanation: The workspace in a computer system makes us easy to navigate to different features and control options.

how can an attacker execute malware through a script?

Answers

Answer:

An attacker can attach a script to a program that you download which then infects your computer.

a file extension of .xlsx means that the file contains what?

Answers

A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).

Answer:

Explanation:

A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).

which of the following is the most reliable storage device:
floppy disk
hard disk
USB
RAM

Answers

Answer:

RAM is the most reliable storage device.

Describe the type of gameplay seen during early video games

Answers

Answer:

2d?

Explanation:

It could be 2D because most games such as early Mario and Donkey Kong games were 2D games.

Answer: Arcade Machines

The earliest gameplay video games were arcade machines such as Mario, Donkey Kong, and PacMan. Most early video games being produced by Nintendo.

what does it mean to clear a setting in a dialog box?

Answers

Answer:

to delete it

Explanation:

what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Answers

Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.

Certificate authority (CA) is simply known as a firm (entity) that has the sole aim for digital certificates.

Certificates often uses centralized third parties called certificate authorities such as x.509 certificates. There are several fields in x.509 and these certificates consist of several characteristics that is perculiar to them.

From the above, we can say that Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.

Learn more from

https://brainly.com/question/17956104

________ is the use of information technology to support the sharing of content among networks of users.

Answers

Answer:

The social media is the use of IT to support the sharing of content among network of users.

Name any four constituent of the 8085 microprocessor.

Answers

Answer:

The timing & control unit, the decoder, serial input/output control and the arithmetic and logic unit.

Some common constituents of the 8085 microprocessor may include an accumulator, arithmetic and logic unit, temporary register, flag register, and address data bus.

What is the configuration state of the 8085 microprocessor?

The configurations state of the 8085 microprocessor mainly include some other constituents like data bus-8-bit, address bus-16 bit, program counter-16-bit, stack pointer-16 bit, registers 8-bit, +5V voltage supply, and operates at 3.2 MHz single segment CLK.

According to the context of this question, an accumulator is an 8-bit register used to perform arithmetic, logical, I/O & LOAD/STORE operations. It also mutually supports the arithmetic and logic unit along with some common types of registers.

Therefore, some common constituents of the 8085 microprocessor are well described above.

To learn more about the microprocessor, refer to the link:

https://brainly.com/question/29243062

#SPJ5

When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________. When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________.

Answers

Answer:

It is called a driver.

Explanation:

A pennant-shaped sign means you are in a _____ zone.

Answers

Answer:

The pennant-shape is only used as a road sign to signal a no-passing zone. No passing zones are stretches of roadway where drivers are not allowed to move into the adjacent lane to pass a vehicle in front.

Can someone check my answers?
I got 4 for c and 17 for d​

Answers

Answer:

both are correct

Explanation:

what is my assurance wireless account number and pin

Answers

Answer:

Call Assurance Wireless at 1-(888)-898-4888 to access your account number. Your PIN is the 6-digit (or 10-digit) number you created, which is located on your welcome letter. Your account number can be found in the top right corner of any bill or by logging into your online account. Do not enter any dashes or hyphens.

Explanation:

pls mark as brainliest and hope this helps

It should be noted that your assurance wireless account number can be found at upper right-hand corner of any bill, and the PIN is the 4 digits that was given to the carrier during the call in.

According to the question, we are to discuss how individuals can know his assurance wireless account number as well as the pin.

As a result if this we can see that the Account number can be obtained at  upper right-hand corner of bill as well as invoice, and the pin is usually 4 digit number.

Therefore, your assurance wireless account number upper right-hand corner of any bill.

Learn more about wireless account number at:

https://brainly.com/question/13162939

Other Questions
I need help with this please Explain why each of the following triangles has an area of 9 squared units River deltas are?formed by depositioncreated by seafloor spreading caused by the movement of tectonic platesareas of infertile, rocky soil The first step of research process is to develop your topic or research problem. What is the importance of considering those factors in selecting a research problem? Solve four-tenths plus four ninths what country is called sakartvelo by its native people? What is the specific heat of a diamond if 4.5 J of heat is required to heat a 0.72 g piece of diamondfrom 10C to 22.3C? Kevin and Randy Muise have a jar containing 68 coins, all of which are either quarters or nickels. The total value of the coins in the jar is $8.00. How many of eachtype of coin do they have?The jar containsquarters Please help me ASAP According to the Declaration of Independence, what is the role of the government in relation to the peoples rights? which trait would be most closely associated with high levels of mobility? Write the expression in simplest form. A solid is heated to its melting point and the resulting liquid is heated. Choose the graph below that shows these temperature changes. Which of the cells shown is a prokaryote?A) muscle cell B) nerve cell C) bacterium D) red blood cell who do you think has the problem in this communication process The cost of $ 385 in 2004 was 10% more than the cost in2003. Calculate the cost in 2003. To miss a particular shade of pink paint white paint and red paint are mixed in the ratio 4:3 if 12 gallons of red paint are mixed with some white paint to make this same shade of pink how many total gallons of pink result A fair dice is rolled. Find the probability of showing an even prime numberplease help me it's math I really need the answer! PLEASE HELP ME AND HURRY TOO NO LIBKS PLEASE I WILL GIVE BRAINLIEST Choose the word whose underlined part is pronounced differently from that of the other words.1. A. hand B. bank C. sand D. band2. A. money B. month C. monkey D. monitor3. A. change B. hungry C. stronger D. singleChoose the word that has different stress pattern from that of the other words.4. A. experience B. embarrass C. floppy D. embrace5. A. idol B. video C. birthday D. imagine6. A. cotton B. happen C. extreme D. quicklyChoose the best answer to complete each sentence.7. A person or thing that is loved and admired very much is the _________. A. ideal B. idea C. idol D. fan8. A short part of a film or movie that is shown separately is called a _________. A. picture B. clip C. news D. cartoon9. She _________shyly at him and then lowered her eyes. A. looked B. stared C. glanced D. sighted10. This _________girl was disliked by the rest of the class. A. helpful B. sneaky C. unselfish D. generous11. He pulled a(n) _________of 10 pounds notes out of his pocket. A. sum B. amount C. piece D. wad12. Ive never fallen in such a(n) _________situation before. A. embarrassed B. embarrassing C. confused D. confusing13. The children were _________about opening their presents. A. interested B. fond C. keen D. excited14. I know from _________that hell arrive late. A. knowledge B. experience C. understanding D. reality15. Andrew _________the test before so he_________it very easy. A. did/ had found B. had done/ found C. was doing/ found D. did/ was founding16. You _________your new hat when I _________you yesterday. A. were wearing/ had met B. wore/ had met C. wore/ was meeting D. were wearing/ met17. As I _________the glass, it suddenly _________into two pieces. A. cut/ broke B. was cutting/ broke C. cut/ was breaking D. was cutting/ had broken18. A burglar _________into the house while we _________television. A. broke/were watching B. broke/ watched C. had broken/ watched D. broke/ had watched19. When I _________home, I _________a phone call. A. got/ received B. was getting/was receiving C. got/ had received D. had got/ had received20. They _________small cups of coffee after they _________dinner. A. had drunk/ finished B. drank/ finished C. were drinking/ finished D. drank/ had finished21. It was midnight. Outside it _________very hard. A. rains B. rained C. had rained D. was raining 22. When he _________at the station, his train already_________. A. arrived/ left B. arrived/ had left C. had arrived/ left D. had arrived/ left